US20080263222A1 - Computer system, root node, and log management method for access path conversion - Google Patents
Computer system, root node, and log management method for access path conversion Download PDFInfo
- Publication number
- US20080263222A1 US20080263222A1 US11/968,737 US96873708A US2008263222A1 US 20080263222 A1 US20080263222 A1 US 20080263222A1 US 96873708 A US96873708 A US 96873708A US 2008263222 A1 US2008263222 A1 US 2008263222A1
- Authority
- US
- United States
- Prior art keywords
- access
- log
- path
- file
- access log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
Definitions
- the present invention relates to storage technology for management of file data stored in a computer system, and in particular relates to log management technology for management of an access log that records file access.
- GNS global name space
- the real local paths that lead to files stored in the storage system are associated with virtual global paths. Consequently, file access from the host computer system can be made without having to modify the access paths, even if the physical access path configuration to the storage system is modified.
- file accesses processed using global paths from the host computer system can be handled on the storage system end, in the same manner as file access processed using local paths.
- JP A-2003-203029 discloses a computer system constituting a global name space.
- the invention is intended to address this issue at least in part, and can be reduced to practice as described in the following embodiments and application examples.
- a computer system is a computer system comprising: a storage system for storing data as a file; a host computer system that performs file access to the storage system; a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system; an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system; an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and
- the displayed access log will have been converted from local paths to global paths, and therefore the analysis process of the access log in a global name space using global paths can be carried out easily.
- a root node is a root node relaying file access from a host computer system to a storage system, the root node comprising: a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system; an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system; an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and an access log display unit that
- an access log converted from local paths to global paths is accumulated in a log management unit, whereby the analysis process of the access log in a global name space using global paths can be carried out easily.
- a log management method is a log management method for managing an access log representing execution of file access from a host computer system to a storage system, the log management method comprising: (a) storing a path configuration table for associating a local path with a global path, in a root node that relays file access from the host computer system to the storage system, wherein the local path represents a location of the file stored in the storage system, the global path represents a virtual location of the stored file to the host computer system; (b) converting, on the root node, a global path used in the file access from the host computer system, into a local path associated, by the path configuration table, with the global path used in the file access, to forward the converted file access to the storage system; (c) receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; (d) converting the local path used in the received access log, into a global path associated, by
- the displayed access log will have been converted from local paths to global paths, and therefore the analysis process of the access log in a global name space using global paths can be carried out easily.
- the embodiments of the present are not limited to those of a computer system, a root node, and a log management method, and can be reduced to practice in possible as well, for example: various devices making up a computer system; as well as programs for implementing by means of a computer at least some of the functions of these devices; or a recording medium having recorded thereon in computer-readable form at least some of these programs.
- the invention is in no wise limited to the embodiments listed above, and can be reduced to practice in various other ways without departing from the spirit of the invention.
- FIG. 1 is an illustration depicting functionally a simplified configuration of a computer system
- FIG. 2 is an illustration primarily depicting the specific configuration of the host computer system in the computer system
- FIG. 3 is an illustration primarily depicting the specific configuration of the root node in the computer system
- FIG. 4 is an illustration depicting an exemplary GNS configuration table managed by the root node
- FIG. 5 is an illustration depicting in model form associations between the GNS and the LNS
- FIG. 6 is an illustration depicting an exemplary request forwarding table managed by the root node
- FIG. 7 is an illustration primarily depicting the specific configuration of a leaf node in the computer system
- FIG. 8 is an illustration primarily depicting the specific configuration of a storage unit in the computer system
- FIG. 9 is an illustration depicting in detail the log management unit in the computer system.
- FIG. 10 is a flowchart depicting a log creation process executed by the leaf node in the computer system
- FIG. 11 is an illustration depicting an exemplary access log created by the leaf node
- FIG. 12 is a flowchart depicting a log substitution process executed by the root node in the computer system
- FIG. 13 is a flowchart depicting the access source substitution process executed by the root node in the computer system
- FIG. 14 is a flowchart depicting the file path substitution process executed by the root node in the computer system
- FIG. 15 is an illustration depicting an example of an access log that has been substituted by the root node
- FIG. 16 is a flowchart depicting a log display process executed by the log management unit in Embodiment 2;
- FIG. 17 is an illustration depicting an example of an unconverted log accumulated in the log accumulation table of the log management unit in Embodiment 2;
- FIG. 18 is an illustration depicting a converted log derived by conversion from the unconverted log of FIG. 17 , by the log display process.
- FIG. 1 is an illustration depicting functionally a simplified configuration of a computer system 10 .
- the computer system 10 has a host computer system 20 for processing data; a root node 30 for providing the host computer system 20 with a global name space (GNS); storage units 60 constituting volumes 690 for data storage; leaf nodes 50 for managing data storage in the storage units 60 ; and a log management unit 70 for managing an access log that records file accesses to the volumes 690 from the host computer system 20 .
- GMS global name space
- storage units 60 constituting volumes 690 for data storage
- leaf nodes 50 for managing data storage in the storage units 60
- a log management unit 70 for managing an access log that records file accesses to the volumes 690 from the host computer system 20 .
- the computer system 10 is also furnished with a GNS network 92 linking the host computer system 20 and the root node 30 so as to enable data communication between them; and a network 94 linking the root node 30 , the leaf nodes 50 , and the log management unit 70 so as to enable data communication among them.
- GNS network 92 there is created a global name space in which file accesses are processed using GNS paths (global paths) that point to virtual locations of files; while on the network 94 there is created a local name space (LNS) in which file accesses are processed using local paths that point to real locations of files.
- GNS network 92 there is created a global name space in which file accesses are processed using GNS paths (global paths) that point to virtual locations of files; while on the network 94 there is created a local name space (LNS) in which file accesses are processed using local paths that point to real locations of files.
- LNS local name space
- the GNS network 92 and the network 94 are constituted as physically separate networks; however, as another embodiment the GNS network 92 could be set up virtually on the network 94 by the root node 30 .
- data communications over the GNS network 92 and the network 94 are based on TCP/IP (Transmission Control Protocol/Internet Protocol) standard.
- the storage units 60 and the leaf nodes 50 constitute storage systems 42 , 44 that save files in the volumes 690 in response to file accesses from the host computer system 20 via the root node 30 .
- the storage system 42 is a system in which the storage unit 60 is connected to the leaf node 50 via a storage network 96
- the storage system 44 is a system in which the storage unit 60 is connected directly to the leaf node 50 .
- data communication in the storage network 96 is based on the iSCSI (Internet Small Computer System Interface) standard using TCP/IP; however, as another embodiment data communication could be based on the Fibre Channel (FC) standard.
- FC Fibre Channel
- FIG. 2 is an illustration primarily depicting the specific configuration of the host computer system 20 in the computer system 10 .
- the host computer system 20 has a central processing unit (hereinafter CPU) 210 for controlling the various parts of the host computer system 20 ; a memory 220 for saving data handled by the CPU 210 ; a GNS interface 232 for file access via the root node 30 through the GNS network 92 ; and a user interface 236 for exchange of data with the user.
- the user interface 236 of the host computer system 20 includes a keyboard and mouse for accepting input from the user, and a display for displaying images to the user.
- the memory 220 of the host computer system 20 stores, as programs for operating the CPU 210 , an operating system (OS) 282 , as well as an application program 284 .
- OS operating system
- application program 284 file access to the volumes 690 from the host computer system 20 is implemented through operation of the CPU 210 in accordance with the OS 282 using the memory 220 ; however, as another embodiment, it could be implemented instead through operation of the CPU 210 in accordance with the application program 284 .
- FIG. 3 is an illustration primarily depicting the specific configuration of the root node 30 in the computer system 10 .
- the root node 30 is a device also termed a virtualization device, a switch, or a storage system.
- the root node 30 has a CPU 310 for controlling the various parts of the root node 30 ; a memory 320 for saving data handled by the CPU 310 ; a hard disk drive (HDD) 350 for storing data handled by the CPU 310 ; a GNS interface 332 for exchange of data with the host computer system 20 via the GNS network 92 ; and a network interface 334 for exchange of data via the network 94 .
- a CPU 310 for controlling the various parts of the root node 30
- a memory 320 for saving data handled by the CPU 310
- HDD hard disk drive
- GNS interface 332 for exchange of data with the host computer system 20 via the GNS network 92
- a network interface 334 for exchange of data via the network 94 .
- a GNS configuration table 392 that lists associations between GNS paths and local paths
- a request forwarding table 394 that lists forwarding destinations on the local name space forwarding the access request from the host computer system 20 .
- Also saved in the memory 320 of the root node 30 as programs for operating the CPU 310 , are a GNS configuration program 382 that configures the global name space on the basis of the GNS configuration table 392 , a switch program 384 that switches the pathway for forwarding access requests from the host computer system 20 to the volumes 690 on the basis of the request forwarding table 394 , and a log conversion program 386 that converts access logs generated the leaf nodes 50 to a format corresponding to the global name space.
- the data stored in the GNS configuration table 392 and the request forwarding table 394 is set through an administrative unit (not shown) that accepts input of instructions by the administrator of the computer system 10 ; some of this data can be modified by means of commands from the host computer system 20 .
- the operation of the root node 30 will be discussed in detail later.
- FIG. 4 is an illustration depicting an exemplary GNS configuration table 392 managed by the root node 30 .
- the GNS configuration table 392 of the root node 30 includes GNS path information 3921 specifying global paths that indicate locations of the volumes 690 on the global name space, local access destination information 3923 identifying locations of the leaf nodes 50 that manage the volumes 690 associated with these GNS paths, and local path information 3925 specifying local paths that indicate the locations of the volumes 690 on the local name space.
- FIG. 5 is an illustration depicting in model form associations between the global name space (GNS) and the local name space (LNS).
- GNS global name space
- LNS local name space
- a global access destination 9211 named “root_node” on the global name space has been created in association with the root node 30 .
- a global folder 9221 named “gnsroot” is set up below the global access destination 9211 .
- Below this global folder 9221 have been created a global folder 9231 named “doc” and a global folder 9232 named “foo.”
- a global folder 9231 named “bar” is created below the global folder 9232 .
- a local access destination 9611 named “leaf_node1” has been created in association with the leaf node 50 of the storage system 42 , on the local name space 960 configured in the storage system 42 .
- a local folder 9621 named “mnt” has been created below the local access destination 9611 .
- a local folder 9631 named “lu01” has been created below the local folder 9621 .
- Below the local folder 9631 have been created a local folder 9641 named “memo” and a local folder 9642 named “meeting.”
- a local access destination 9711 named “leaf_node2” has been created in association with the leaf node 50 of the storage system 44 , on the local name space 970 configured in the storage system 44 .
- a local folder 9721 named “mnt” has been created below the local access destination 9711 .
- a local folder 9731 named “lu00” has been created below the local folder 9721 .
- Below the local folder 9731 have been created a local folder 9741 named “hoge” and a local folder 9742 named “tmp.”
- the global folder 9231 specified by the GNS path “/gnsroot/doc” is associated with the local folder 9631 specified by the local path “/mnt/lu01” managed by the local access destination “leaf_node1”; the global folder 9241 specified by the GNS path “/gnsroot/foolbar” is associated with the local folder 9731 specified by the local path “/mnt/lu00” managed by the local access destination “leaf_node2.”
- FIG. 6 is an illustration depicting an exemplary request forwarding table 394 managed by the root node 30 .
- the request forwarding table 394 of the root node 30 contains global access origination information 3943 identifying the host computer system 20 issuing an access request over the global name space; a global process ID 3941 indicating an access identification code appended to the access request over the global name space; local access destination information 3945 identifying the leaf node 50 which is the recipient of the access request forwarded over the local name space; and a local process ID indicating an access identification code appended to the access request over the local name space.
- global access origination information 3943 identifying the host computer system 20 issuing an access request over the global name space
- a global process ID 3941 indicating an access identification code appended to the access request over the global name space
- local access destination information 3945 identifying the leaf node 50 which is the recipient of the access request forwarded over the local name space
- a local process ID indicating an access identification code appended to the access request over the local name space.
- an access request with the global process ID “ 50 ” appended is issued over the global space by the host computer system 20 named “host2” originating global access; the local process ID “ 200 ” is then appended to the access request, which is then forwarded to the leaf node 50 named “leaf_node1” as the local access destination.
- an access request with the global process ID “ 60 ” appended is issued over the global space by the host computer system 20 named “host1” originating global access; the local process ID “ 2100 ” is then appended to the access request, which is then forwarded to the leaf node 50 named “leaf_node2” as the local access destination.
- FIG. 7 is an illustration primarily depicting the specific configuration of a leaf node 50 in the computer system 10 .
- the leaf node 50 is a device also termed a file server.
- the leaf node 50 has a CPU 510 for controlling the various parts of the leaf node 50 ; a memory 520 for saving data handled by the CPU 510 ; a network interface 534 for exchange of data via the network 94 ; and a storage interface 536 for exchange of data with the storage unit 60 .
- the memory 520 of the leaf node 50 stores, as programs for operating the CPU 510 , an access management program 582 for managing file access to the volume 690 of the storage unit 60 through the network 94 ; and a log creation program 584 for creating an access log which records the mode of file access to the volume 690 of the storage unit 60 .
- the access log created by the CPU 510 of the leaf node 50 on the basis of the log creation program 584 is recorded using local paths handled over the local name space. The operation of the leaf node 50 will be discussed in detail later.
- FIG. 8 is an illustration primarily depicting the specific configuration of a storage unit 60 in the computer system 10 .
- the storage unit 60 has a CPU 610 for controlling the various parts of the storage unit 60 ; a memory 620 for saving data handled by the CPU 610 ; a storage interface 636 for exchange of data with the leaf node 50 ; a plurality of hard disk drives (HDD) 650 ; a disk interface 642 for exchange of data with the plurality of HDD 350 ; and a cache memory 644 for temporarily saving data exchanged between the storage interface 636 and the disk interface 642 .
- HDD hard disk drives
- the memory 620 of the storage unit 60 stores, as programs for operating the CPU 610 , a storage configuration program 682 and an access management program 684 .
- the volume 690 of the storage unit 60 is logically configured by means of management of the plurality of HDD 650 by RAID (Redundant Arrays of Independent (Inexpensive) Disks) technology, by the CPU 610 in accordance with the storage configuration program 682 using the memory 620 .
- the storage devices that make up the volume 690 are not limited to HDD, and it would be acceptable to instead use semiconductor memory, or a combination of HDD and semiconductor memory.
- FIG. 9 is an illustration depicting in detail the log management unit 70 in the computer system 10 .
- the log management unit 70 has a CPU 710 for controlling the various parts of the log management unit 70 ; a memory 720 for saving data handled by the CPU 710 ; a hard disk drive (HDD) 750 for storing data saved in the memory 720 ; a network interface 734 for exchange of data via the network 94 ; and a user interface 736 for exchange of data with the administrator of the computer system 10 .
- the user interface 736 of the log management unit 70 includes a keyboard and mouse for accepting input from the administrator, and a display for displaying images to the administrator.
- a log accumulation table 792 containing accumulated access logs that were processed in the computer system 10 .
- the memory 720 of the log management unit 70 stores, as programs for operating the CPU 710 , a log collection program 782 for collecting access logs via the network interface 734 and storing them in the log accumulation table 792 ; and a log display program 784 for displaying access logs that have been accumulated in the log accumulation table 792 .
- the log management unit 70 displays the access logs that have been accumulated in the log accumulation table 792 , on the display of the user interface 736 .
- the access logs accumulated in the log accumulation table 792 of the log management unit 70 could be displayed on the display of the host computer system 20 having access to the log management unit 70 , or of some other device.
- FIG. 10 is a flowchart depicting a log creation process (Step S 5100 ) executed by the leaf node 50 in the computer system 10 .
- the log creation process of FIG. 10 (Step S 5100 ) is implemented through software-controlled operation of the CPU 510 of the leaf node 50 .
- the leaf node 50 initiates the log creation process of FIG. 10 (Step S 5100 ), in the event that file access to a volume of the storage unit 60 via the leaf node 50 has been processed.
- the leaf node 50 decides whether it is necessary to create an access log on the leaf node 50 in relation to file access that was handled by the leaf node 50 (Step S 5110 ). For example, in the event that an access log relating to the file access in question will be created by the root node 30 , there will be no need to create an access log on the leaf node 50 .
- Step S 5110 If the leaf node 50 decides that it is necessary to create an access log (Step S 5110 ), it creates an access log recording execution of file access handled by the leaf node 50 (Step S 5120 ).
- FIG. 11 is an illustration depicting an exemplary access log 592 created by the leaf node 50 .
- the access log 592 contains local access destination information 5921 , access time information 5922 , command information 5923 , local path information 5924 , local access source information 5925 , a local process ID 5926 , and result information 5927 .
- the local access destination information 5921 in the access log 592 includes information that identifies the leaf node 50 which is the destination for transfer of the access request over the local name space.
- the access time information 5922 in the access log 592 includes information indicating the time at which the access request was processed.
- the command information 5923 in the access log 592 includes information indicating the process function specified by the access request.
- the command information 5923 indicates “open,” this indicates a process function of enabling file access; “create” indicates a process function of creating a new file; “write” indicates a process function of writing data to a file; and “read” indicates a process function of reading data from a file.
- the local path information 5924 in the access log 592 indicates the local path specified in the access request.
- the local access source information 5925 in the access log 592 includes information that identifies the source root node 30 which forwarded the access request over the local name space.
- the local process ID 5926 in the access log 592 includes information that indicates the local process ID appended to the access request.
- the result information 5927 in the access log 592 includes information indicating whether the access request was executed normally.
- Step S 5120 after the access log has been created (Step S 5120 ), in the event that the access log includes a local path (Step S 5130 ) and it is necessary to convert the local path of the access log into a GNS path (Step S 5140 ), the leaf node 50 will transmit the access log to the root node 30 (Step S 5150 ). For example, since all of the entries in the access log 592 include the local path as the local path information 5924 , after they have been created they will be transmitted to the root node 30 .
- the leaf node 50 will transmit the access log to the log management unit 70 (Step S 5160 ).
- the log management unit 70 receives the access log from the leaf node 50 , it stores the access log in the log accumulation table 792 .
- FIG. 12 is a flowchart depicting a log substitution process (Step S 3100 ) executed by the root node 30 in the computer system 10 .
- the log substitution process of FIG. 12 (Step S 3100 ) is implemented through software-controlled operation of the CPU 310 of the root node 30 .
- the root node 30 initiates the log substitution process of FIG. 12 (Step S 3100 ) in the event that the leaf node 50 has sent the access log 592 to the root node 30 (Step S 5150 ),
- the root node 30 receives the access log 592 from the leaf node 50 (Step S 3110 ). Thereafter, by means of executing an access source substitution process (Step S 3120 ) and a file path substitution process (Step S 3130 ), the root node 30 replaces the information relating to the local name space contained in the access log 592 sent by the leaf node 50 , with information relating to the global name space.
- the access source substitution process (Step S 3120 )
- the local access source information 5925 and the local process ID 5926 contained in the access log 592 that was received from the leaf node 50 are replaced with information on the global name space.
- the root node 30 transmits to the log management unit 70 the access log in which the information relating to the local name space has been replaced (Step S 3140 ).
- the log management unit 70 upon receiving the access log from the root node 30 , stores the access log in the log accumulation table 92 .
- FIG. 13 is a flowchart depicting the access source substitution process (Step S 3120 ) executed by the root node 30 in the computer system 10 .
- the root node 30 verifies the local access destination information 5921 and the local process ID 5926 contained in the access log 592 that was received from the leaf node 50 (Step S 3122 ).
- the root node 30 searches the entries in the request forwarding table 394 for ones matching the information contained in the local access destination information 5921 and the local process ID 5926 that were verified in the access log 592 , and identifies from the request forwarding table 394 the global access source information 3943 and the global process ID 3941 associated with these entries (Step S 3124 ).
- the root node 30 then replaces the local access source information 5925 contained in the access log 592 that was received from the leaf node 50 , with the information contained in the global access source information 3943 identified from the request forwarding table 394 (Step S 3126 ), as well as replacing the local process ID 5926 contained in the access log 592 that was received from the leaf node 50 with the information contained in the global process ID 3941 identified from the request forwarding table 394 (Step S 3128 ).
- FIG. 14 is a flowchart depicting the file path substitution process (Step S 3130 ) executed by the root node 30 in the computer system 10 .
- Step S 3130 the file path substitution process shown in FIG. 14
- the root node 30 verifies the local access destination information 5921 and the local path information 5924 contained in the access log 592 contained in the access log 592 that was received from the leaf node 50 (Step S 3132 ).
- the root node 30 searches the entries in the GNS configuration table 392 for ones matching the information contained in the local access destination information 5921 and the local path information 5924 that were verified in the access log 592 , and identifies from the GNS configuration table 392 the GNS path information 3921 associated with the entries (Step S 3134 ).
- the root node 30 then replaces the local access destination information 5921 contained in the access log 592 that was received from the leaf node 50 , with information indicating the location of the root node 30 in the global name space (Step S 3136 ), as well as replacing the local path information 5924 contained in the access log 592 that was received from the leaf node 50 , with the information contained in the GNS path information 3921 identified from the GNS configuration table 392 (Step S 3138 ).
- FIG. 15 is an illustration depicting an example of an access log 392 that has been substituted by the root node 30 .
- the access log 392 of FIG. 15 is a log derived by processing of the access log 592 shown in FIG. 11 , by the access source substitution process (Step S 3120 ) and the file path substitution process (Step S 3130 ).
- the access log 392 includes global access destination information 7921 , access time information 7922 , command information 7923 , GNS path information 7924 , global access source information 7925 , a global process ID 7926 , and result information 7927 .
- the global access destination information 7921 of the access log 392 includes the information that was substituted for the local access destination information 5921 in the access log 592 by the file path substitution process (Step S 3130 ).
- the access time information 7922 of the access log 392 contains information similar to the access time information 5922 of the access log 592 .
- the command information 7923 of the access log 392 contains information similar to the command information 5923 of the access log 592 .
- the GNS path information 7924 of the access log 392 contains the information that was substituted for the local path information 5924 of the access log 592 by the file path substitution process (Step S 3130 ).
- the global access source information 7925 of the access log 392 contains the information that was substituted for the local access destination information 5925 of the access log 592 by the access destination substitution process (Step S 3120 ).
- the global process ID 7926 of the access log 392 contains the information that was substituted for the local process ID 5926 of the access log 592 by the access destination substitution process (Step S 3120 ).
- the result information 7921 of the access log 392 contains information similar to the result information 5927 of the access log 592 .
- the access log 392 displayed by the log management unit 70 is one that has been converted from local paths to global paths, the process of analyzing the access log in the global name space using global paths can be carried out easily. Moreover, since the access log 392 that has been converted from local paths to global paths has been accumulated in the log accumulation table 792 of the log management unit 70 prior to display of the log, the speed of response to a log display request can be improved. Furthermore, since conversion of the access log from local paths to global paths is executed by the root node 30 that manages associations between local paths to global paths, processing efficiency in the computer system 10 can be improved.
- Embodiment 2 is similar to the computer system 10 of Embodiment 1, except that all access logs created by the leaf nodes 50 are transmitted directly to the log management unit 70 without going through the root node 30 , for storage in the log accumulation table 792 of the log management unit 70 .
- FIG. 16 is a flowchart depicting a log display process (Step S 7100 ) executed by the log management unit 70 in Embodiment 2.
- the log display process of FIG. 16 (Step S 7100 ) is implemented through software-controlled operation of the CPU 710 of the log management unit 70 .
- the log management unit 70 initiates the log display process of FIG. 16 (Step S 7100 ) in the event that the administrator of the log management unit 70 requests log display through the user interface 736 .
- Step S 7100 When the log display process of FIG. 16 (Step S 7100 ) is initiated, the log management unit 70 receives the log display request from the administrator via the user interface 736 (Step S 7110 ). The log management unit 70 then reads out from the log accumulation table 792 the range of access log entries specified in the log display request which it has received (Step S 7120 ).
- Step S 7130 the log management unit 70 will execute an access source substitution process (Step S 7140 ) and a file path substitution process (Step S 7150 ), then display the access log on the display via the user interface (Step S 7160 ). If on other hand conversion of the access log is not necessary (Step S 7130 ), the log management unit 70 will display on the display the unmodified access log read out from the log accumulation table 792 (Step S 7170 ).
- Step S 7130 Instances in which modification of the access log is not necessary (Step S 7130 ) could include, for example, where the access log contains no file paths (e.g. when acquiring file system attributes, or switching the file forwarding mode), or where an access log has been created for the system administrator (e.g. a wiring fault between devices, a power fault, etc.).
- the access source substitution process (Step S 7140 ) and the file path substitution process (Step S 7150 ) are similar to the access source substitution process (Step S 3120 ) and the file path substitution process (Step S 3130 ), except that they are executed by the log management unit 70 instead of the root node 30 .
- the log management unit 70 collects information contained in the logs in order to create tables similar to the GNS configuration table 392 and the request forwarding table 394 managed by the root node 30 , and stores these tables in the HDD 750 .
- FIG. 17 is an illustration depicting an example of an unconverted log 794 accumulated in the log accumulation table 792 of the log management unit 70 in Embodiment 2.
- FIG. 18 is an illustration depicting a converted log 796 derived by conversion from the unconverted log 794 of FIG. 17 , by the log display process (Step S 7100 ).
- the log management unit 70 creates a table similar to the GNS configuration table 392 , from the log entry relating to the command “change_gns” shown in the first row of FIG. 17 .
- the log management unit 70 creates a table similar to the request forwarding table 394 , from the log entries relating to the command “forward” shown in the second and fourth rows of FIG. 17 .
- the log entries relating to the command “change_gns” and the command “forward” are handled as log entries for which path conversion is unnecessary in the log display process (Step S 7100 ), and are displayed as-is without conversion, as shown in the converted log 976 of FIG. 18 .
- Step S 7100 since conversion of the access log from local paths to global paths is executed in response to a log display request (Step S 7100 ), the processing load on the computer system during execution of file access can be reduced.
- the access display unit may include: a post-conversion log accumulation unit for cumulating the access log converted from the local path to the global path by the access log conversion unit; and a accumulated log display unit that displays the access log accumulated in the post-conversion log accumulation unit, in response to a request for displaying the accumulated access log.
- a post-conversion log accumulation unit for cumulating the access log converted from the local path to the global path by the access log conversion unit
- a accumulated log display unit that displays the access log accumulated in the post-conversion log accumulation unit, in response to a request for displaying the accumulated access log.
- the access log conversion unit may include: a pre-conversion log accumulation unit for cumulating the access log received by the access log reception unit; and a accumulated log conversion unit that converts the local path used in the access log accumulated in the pre-conversion log accumulation unit, into the global path associated, by the path configuration unit, with the local path used in the accumulated access log.
- conversion of the access log from local paths to global paths is executed in response to a log display request, whereby it is possible to reduce the processing load on the computer system during execution of file access.
- the computer system may further comprise a root node that is connected to the host computer system and constitutes the access path conversion unit, and the path configuration unit, the access log reception unit, and the access log conversion unit may be disposed in the root node. According the computer system described above, conversion of the access log from local paths to global paths is executed by a root node that manages the associations between local paths and global paths, whereby processing efficiency in the computer system can be improved.
- the storage system may include: a storage unit for storing the file; and a leaf node that manages file storage in the storage unit; and the leaf node may include: a log creation unit that creates the access log using a local path; and a log forwarding unit that forwards the access log created by the log creation unit to the access log reception unit.
- the access path conversion unit may convert an access request source appended to the file access, from the host computer system to the access path conversion unit, in addition to converting the global path used in the file access into the local path; and the access log conversion unit may convert an access request source recorded in the access log from the access path conversion unit to the host computer system, in addition to converting the local path used in the access log into the global path.
- the access path conversion unit may convert an access identification code appended to the file access, from a first identification code to a second identification code, in addition to converting the global path used in the file access into the local path; and the access log conversion unit may convert an access identification code recorded in the access log from the second identification code to the first identification code, in addition to converting the local path used in the access log into the global path.
Abstract
A computer system including a storage system, a host computer system, a path configuration unit that associates a local path with a global path, an access path conversion unit that converts a global path into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system, an access log reception unit that receives an access log from the storage system, an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log, and an access log display unit that displays the converted access log.
Description
- The present application claims the priority based on Japanese Patent Application No. 2007-111549 filed on Apr. 20, 2007, the disclosure of which is hereby incorporated by reference in its entirety.
- 1. Technical Field
- The present invention relates to storage technology for management of file data stored in a computer system, and in particular relates to log management technology for management of an access log that records file access.
- 2. Related Art
- Some computer systems to employ a global name space (hereinafter also denoted as GNS) to manage in unified fashion the access paths from a host computer system to a storage system. In a global name space, the real local paths that lead to files stored in the storage system are associated with virtual global paths. Consequently, file access from the host computer system can be made without having to modify the access paths, even if the physical access path configuration to the storage system is modified. By means of a global name space, file accesses processed using global paths from the host computer system can be handled on the storage system end, in the same manner as file access processed using local paths. JP A-2003-203029 discloses a computer system constituting a global name space.
- With the global name spaces discussed above, since the access log which records file access history is created on the storage system end, using local paths, it is difficult to analyze the access log from the host computer system, which uses global paths.
- With the foregoing in view, it is an object of the invention to provide a storage technology whereby the analysis process of the access log in a global name space can be carried out easily.
- The invention is intended to address this issue at least in part, and can be reduced to practice as described in the following embodiments and application examples.
- A computer system according to an aspect of the invention is a computer system comprising: a storage system for storing data as a file; a host computer system that performs file access to the storage system; a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system; an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system; an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and an access log display unit that displays the access log converted from the local path into the global path by the access log conversion unit.
- According the computer system described above, the displayed access log will have been converted from local paths to global paths, and therefore the analysis process of the access log in a global name space using global paths can be carried out easily.
- A root node according to an aspect of the invention is a root node relaying file access from a host computer system to a storage system, the root node comprising: a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system; an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system; an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and an access log display unit that displays the access log converted from the local path into the global path by the access log conversion unit.
- According the root node described above, an access log converted from local paths to global paths is accumulated in a log management unit, whereby the analysis process of the access log in a global name space using global paths can be carried out easily.
- A log management method according to an aspect of the invention is a log management method for managing an access log representing execution of file access from a host computer system to a storage system, the log management method comprising: (a) storing a path configuration table for associating a local path with a global path, in a root node that relays file access from the host computer system to the storage system, wherein the local path represents a location of the file stored in the storage system, the global path represents a virtual location of the stored file to the host computer system; (b) converting, on the root node, a global path used in the file access from the host computer system, into a local path associated, by the path configuration table, with the global path used in the file access, to forward the converted file access to the storage system; (c) receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access; (d) converting the local path used in the received access log, into a global path associated, by the path configuration table, with the local path used in the received access log; and (e) displaying the access log converted from the local path into the global path.
- According the log management method described above, the displayed access log will have been converted from local paths to global paths, and therefore the analysis process of the access log in a global name space using global paths can be carried out easily.
- The embodiments of the present are not limited to those of a computer system, a root node, and a log management method, and can be reduced to practice in possible as well, for example: various devices making up a computer system; as well as programs for implementing by means of a computer at least some of the functions of these devices; or a recording medium having recorded thereon in computer-readable form at least some of these programs. However, the invention is in no wise limited to the embodiments listed above, and can be reduced to practice in various other ways without departing from the spirit of the invention.
- These and other objects, features, aspects, and advantages of the invention will become more apparent from the following detailed description of the preferred embodiments with the accompanying drawings.
- The invention will be described with reference to the accompanying drawings in which:
-
FIG. 1 is an illustration depicting functionally a simplified configuration of a computer system; -
FIG. 2 is an illustration primarily depicting the specific configuration of the host computer system in the computer system; -
FIG. 3 is an illustration primarily depicting the specific configuration of the root node in the computer system; -
FIG. 4 is an illustration depicting an exemplary GNS configuration table managed by the root node; -
FIG. 5 is an illustration depicting in model form associations between the GNS and the LNS; -
FIG. 6 is an illustration depicting an exemplary request forwarding table managed by the root node; -
FIG. 7 is an illustration primarily depicting the specific configuration of a leaf node in the computer system; -
FIG. 8 is an illustration primarily depicting the specific configuration of a storage unit in the computer system; -
FIG. 9 is an illustration depicting in detail the log management unit in the computer system; -
FIG. 10 is a flowchart depicting a log creation process executed by the leaf node in the computer system; -
FIG. 11 is an illustration depicting an exemplary access log created by the leaf node; -
FIG. 12 is a flowchart depicting a log substitution process executed by the root node in the computer system; -
FIG. 13 is a flowchart depicting the access source substitution process executed by the root node in the computer system; -
FIG. 14 is a flowchart depicting the file path substitution process executed by the root node in the computer system; -
FIG. 15 is an illustration depicting an example of an access log that has been substituted by the root node; -
FIG. 16 is a flowchart depicting a log display process executed by the log management unit in Embodiment 2; -
FIG. 17 is an illustration depicting an example of an unconverted log accumulated in the log accumulation table of the log management unit in Embodiment 2; and -
FIG. 18 is an illustration depicting a converted log derived by conversion from the unconverted log ofFIG. 17 , by the log display process. - In order to provide a fuller understanding of the constitution and operation of the invention set forth hereinabove, a computer system in which the invention is implemented will be discussed below.
- A1. Configuration of Computer System:
-
FIG. 1 is an illustration depicting functionally a simplified configuration of acomputer system 10. Thecomputer system 10 has ahost computer system 20 for processing data; aroot node 30 for providing thehost computer system 20 with a global name space (GNS);storage units 60 constitutingvolumes 690 for data storage;leaf nodes 50 for managing data storage in thestorage units 60; and alog management unit 70 for managing an access log that records file accesses to thevolumes 690 from thehost computer system 20. InFIG. 1 , with a view to keeping the drawing simple only a singlehost computer system 20 is shown, but in actual practice thecomputer system 10 could be provided with a number ofhost computer systems 20. - The
computer system 10 is also furnished with aGNS network 92 linking thehost computer system 20 and theroot node 30 so as to enable data communication between them; and anetwork 94 linking theroot node 30, theleaf nodes 50, and thelog management unit 70 so as to enable data communication among them. On theGNS network 92 there is created a global name space in which file accesses are processed using GNS paths (global paths) that point to virtual locations of files; while on thenetwork 94 there is created a local name space (LNS) in which file accesses are processed using local paths that point to real locations of files. In the present embodiment, the GNSnetwork 92 and thenetwork 94 are constituted as physically separate networks; however, as another embodiment the GNSnetwork 92 could be set up virtually on thenetwork 94 by theroot node 30. In the present embodiment, data communications over the GNSnetwork 92 and thenetwork 94 are based on TCP/IP (Transmission Control Protocol/Internet Protocol) standard. - The
storage units 60 and theleaf nodes 50 constitutestorage systems volumes 690 in response to file accesses from thehost computer system 20 via theroot node 30. Thestorage system 42 is a system in which thestorage unit 60 is connected to theleaf node 50 via astorage network 96, while thestorage system 44 is a system in which thestorage unit 60 is connected directly to theleaf node 50. In the present embodiment, data communication in thestorage network 96 is based on the iSCSI (Internet Small Computer System Interface) standard using TCP/IP; however, as another embodiment data communication could be based on the Fibre Channel (FC) standard. InFIG. 1 , with a view to keeping the drawing simple only asingle storage unit 60 is shown in thestorage system 42, but in actualpractice storage system 42 could be provided with a number ofstorage units 60. -
FIG. 2 is an illustration primarily depicting the specific configuration of thehost computer system 20 in thecomputer system 10. Thehost computer system 20 has a central processing unit (hereinafter CPU) 210 for controlling the various parts of thehost computer system 20; amemory 220 for saving data handled by theCPU 210; aGNS interface 232 for file access via theroot node 30 through theGNS network 92; and auser interface 236 for exchange of data with the user. In the present embodiment, theuser interface 236 of thehost computer system 20 includes a keyboard and mouse for accepting input from the user, and a display for displaying images to the user. Thememory 220 of thehost computer system 20 stores, as programs for operating theCPU 210, an operating system (OS) 282, as well as anapplication program 284. In the present embodiment, file access to thevolumes 690 from thehost computer system 20 is implemented through operation of theCPU 210 in accordance with theOS 282 using thememory 220; however, as another embodiment, it could be implemented instead through operation of theCPU 210 in accordance with theapplication program 284. -
FIG. 3 is an illustration primarily depicting the specific configuration of theroot node 30 in thecomputer system 10. Theroot node 30 is a device also termed a virtualization device, a switch, or a storage system. Theroot node 30 has aCPU 310 for controlling the various parts of theroot node 30; amemory 320 for saving data handled by theCPU 310; a hard disk drive (HDD) 350 for storing data handled by theCPU 310; aGNS interface 332 for exchange of data with thehost computer system 20 via theGNS network 92; and anetwork interface 334 for exchange of data via thenetwork 94. In thememory 320 of theroot node 30 are saved a GNS configuration table 392 that lists associations between GNS paths and local paths, and a request forwarding table 394 that lists forwarding destinations on the local name space forwarding the access request from thehost computer system 20. Also saved in thememory 320 of theroot node 30, as programs for operating theCPU 310, are aGNS configuration program 382 that configures the global name space on the basis of the GNS configuration table 392, aswitch program 384 that switches the pathway for forwarding access requests from thehost computer system 20 to thevolumes 690 on the basis of the request forwarding table 394, and alog conversion program 386 that converts access logs generated theleaf nodes 50 to a format corresponding to the global name space. In the present embodiment, the data stored in the GNS configuration table 392 and the request forwarding table 394 is set through an administrative unit (not shown) that accepts input of instructions by the administrator of thecomputer system 10; some of this data can be modified by means of commands from thehost computer system 20. The operation of theroot node 30 will be discussed in detail later. -
FIG. 4 is an illustration depicting an exemplary GNS configuration table 392 managed by theroot node 30. The GNS configuration table 392 of theroot node 30 includesGNS path information 3921 specifying global paths that indicate locations of thevolumes 690 on the global name space, localaccess destination information 3923 identifying locations of theleaf nodes 50 that manage thevolumes 690 associated with these GNS paths, andlocal path information 3925 specifying local paths that indicate the locations of thevolumes 690 on the local name space. -
FIG. 5 is an illustration depicting in model form associations between the global name space (GNS) and the local name space (LNS). As shown inFIG. 5 , in the present embodiment, aglobal access destination 9211 named “root_node” on the global name space has been created in association with theroot node 30. Aglobal folder 9221 named “gnsroot” is set up below theglobal access destination 9211. Below thisglobal folder 9221 have been created aglobal folder 9231 named “doc” and aglobal folder 9232 named “foo.” Aglobal folder 9231 named “bar” is created below theglobal folder 9232. - As shown in
FIG. 5 , in the present embodiment, alocal access destination 9611 named “leaf_node1” has been created in association with theleaf node 50 of thestorage system 42, on thelocal name space 960 configured in thestorage system 42. Alocal folder 9621 named “mnt” has been created below thelocal access destination 9611. Alocal folder 9631 named “lu01” has been created below thelocal folder 9621. Below thelocal folder 9631 have been created alocal folder 9641 named “memo” and alocal folder 9642 named “meeting.” - As shown in
FIG. 5 , in the present embodiment, alocal access destination 9711 named “leaf_node2” has been created in association with theleaf node 50 of thestorage system 44, on thelocal name space 970 configured in thestorage system 44. Alocal folder 9721 named “mnt” has been created below thelocal access destination 9711. Alocal folder 9731 named “lu00” has been created below thelocal folder 9721. Below thelocal folder 9731 have been created alocal folder 9741 named “hoge” and alocal folder 9742 named “tmp.” - According to the GNS configuration table shown in
FIG. 4 , theglobal folder 9231 specified by the GNS path “/gnsroot/doc” is associated with thelocal folder 9631 specified by the local path “/mnt/lu01” managed by the local access destination “leaf_node1”; theglobal folder 9241 specified by the GNS path “/gnsroot/foolbar” is associated with thelocal folder 9731 specified by the local path “/mnt/lu00” managed by the local access destination “leaf_node2.” -
FIG. 6 is an illustration depicting an exemplary request forwarding table 394 managed by theroot node 30. The request forwarding table 394 of theroot node 30 contains globalaccess origination information 3943 identifying thehost computer system 20 issuing an access request over the global name space; aglobal process ID 3941 indicating an access identification code appended to the access request over the global name space; localaccess destination information 3945 identifying theleaf node 50 which is the recipient of the access request forwarded over the local name space; and a local process ID indicating an access identification code appended to the access request over the local name space. In the example ofFIG. 6 , an access request with the global process ID “50” appended is issued over the global space by thehost computer system 20 named “host2” originating global access; the local process ID “200” is then appended to the access request, which is then forwarded to theleaf node 50 named “leaf_node1” as the local access destination. In the example ofFIG. 6 , an access request with the global process ID “60” appended is issued over the global space by thehost computer system 20 named “host1” originating global access; the local process ID “2100” is then appended to the access request, which is then forwarded to theleaf node 50 named “leaf_node2” as the local access destination. -
FIG. 7 is an illustration primarily depicting the specific configuration of aleaf node 50 in thecomputer system 10. Theleaf node 50 is a device also termed a file server. Theleaf node 50 has aCPU 510 for controlling the various parts of theleaf node 50; amemory 520 for saving data handled by theCPU 510; anetwork interface 534 for exchange of data via thenetwork 94; and astorage interface 536 for exchange of data with thestorage unit 60. Thememory 520 of theleaf node 50 stores, as programs for operating theCPU 510, anaccess management program 582 for managing file access to thevolume 690 of thestorage unit 60 through thenetwork 94; and alog creation program 584 for creating an access log which records the mode of file access to thevolume 690 of thestorage unit 60. In the present embodiment, the access log created by theCPU 510 of theleaf node 50 on the basis of thelog creation program 584 is recorded using local paths handled over the local name space. The operation of theleaf node 50 will be discussed in detail later. -
FIG. 8 is an illustration primarily depicting the specific configuration of astorage unit 60 in thecomputer system 10. Thestorage unit 60 has aCPU 610 for controlling the various parts of thestorage unit 60; amemory 620 for saving data handled by theCPU 610; astorage interface 636 for exchange of data with theleaf node 50; a plurality of hard disk drives (HDD) 650; adisk interface 642 for exchange of data with the plurality ofHDD 350; and acache memory 644 for temporarily saving data exchanged between thestorage interface 636 and thedisk interface 642. - The
memory 620 of thestorage unit 60 stores, as programs for operating theCPU 610, astorage configuration program 682 and anaccess management program 684. In the present embodiment, thevolume 690 of thestorage unit 60 is logically configured by means of management of the plurality ofHDD 650 by RAID (Redundant Arrays of Independent (Inexpensive) Disks) technology, by theCPU 610 in accordance with thestorage configuration program 682 using thememory 620. The storage devices that make up thevolume 690 are not limited to HDD, and it would be acceptable to instead use semiconductor memory, or a combination of HDD and semiconductor memory. -
FIG. 9 is an illustration depicting in detail thelog management unit 70 in thecomputer system 10. Thelog management unit 70 has aCPU 710 for controlling the various parts of thelog management unit 70; amemory 720 for saving data handled by theCPU 710; a hard disk drive (HDD) 750 for storing data saved in thememory 720; anetwork interface 734 for exchange of data via thenetwork 94; and auser interface 736 for exchange of data with the administrator of thecomputer system 10. In the present embodiment, theuser interface 736 of thelog management unit 70 includes a keyboard and mouse for accepting input from the administrator, and a display for displaying images to the administrator. In theHDD 750 of thelog management unit 70 there is stored a log accumulation table 792 containing accumulated access logs that were processed in thecomputer system 10. Thememory 720 of thelog management unit 70 stores, as programs for operating theCPU 710, alog collection program 782 for collecting access logs via thenetwork interface 734 and storing them in the log accumulation table 792; and alog display program 784 for displaying access logs that have been accumulated in the log accumulation table 792. In the present embodiment, on the basis of instruction input from theuser interface 736 thelog management unit 70 displays the access logs that have been accumulated in the log accumulation table 792, on the display of theuser interface 736. As another embodiment, the access logs accumulated in the log accumulation table 792 of thelog management unit 70 could be displayed on the display of thehost computer system 20 having access to thelog management unit 70, or of some other device. - A2. Computer System Operation:
-
FIG. 10 is a flowchart depicting a log creation process (Step S5100) executed by theleaf node 50 in thecomputer system 10. In the present embodiment, the log creation process ofFIG. 10 (Step S5100) is implemented through software-controlled operation of theCPU 510 of theleaf node 50. In the present embodiment, theleaf node 50 initiates the log creation process ofFIG. 10 (Step S5100), in the event that file access to a volume of thestorage unit 60 via theleaf node 50 has been processed. - Once the log creation process of
FIG. 10 (Step S5100) has been initiated, theleaf node 50 decides whether it is necessary to create an access log on theleaf node 50 in relation to file access that was handled by the leaf node 50 (Step S5110). For example, in the event that an access log relating to the file access in question will be created by theroot node 30, there will be no need to create an access log on theleaf node 50. - If the
leaf node 50 decides that it is necessary to create an access log (Step S5110), it creates an access log recording execution of file access handled by the leaf node 50 (Step S5120). -
FIG. 11 is an illustration depicting an exemplary access log 592 created by theleaf node 50. Theaccess log 592 contains localaccess destination information 5921,access time information 5922,command information 5923,local path information 5924, localaccess source information 5925, alocal process ID 5926, and resultinformation 5927. The localaccess destination information 5921 in the access log 592 includes information that identifies theleaf node 50 which is the destination for transfer of the access request over the local name space. Theaccess time information 5922 in the access log 592 includes information indicating the time at which the access request was processed. Thecommand information 5923 in the access log 592 includes information indicating the process function specified by the access request. For example, where thecommand information 5923 indicates “open,” this indicates a process function of enabling file access; “create” indicates a process function of creating a new file; “write” indicates a process function of writing data to a file; and “read” indicates a process function of reading data from a file. Thelocal path information 5924 in the access log 592 indicates the local path specified in the access request. The localaccess source information 5925 in the access log 592 includes information that identifies thesource root node 30 which forwarded the access request over the local name space. Thelocal process ID 5926 in the access log 592 includes information that indicates the local process ID appended to the access request. Theresult information 5927 in the access log 592 includes information indicating whether the access request was executed normally. - Returning to
FIG. 10 , after the access log has been created (Step S5120), in the event that the access log includes a local path (Step S5130) and it is necessary to convert the local path of the access log into a GNS path (Step S5140), theleaf node 50 will transmit the access log to the root node 30 (Step S5150). For example, since all of the entries in the access log 592 include the local path as thelocal path information 5924, after they have been created they will be transmitted to theroot node 30. - If on the other hand, the created access log does not contain a local path (Step S5130), or in instances where it has been preestablished that the created access log is of a type that does not require path conversion (Step S5140), the
leaf node 50 will transmit the access log to the log management unit 70 (Step S5160). In the present embodiment, once thelog management unit 70 receives the access log from theleaf node 50, it stores the access log in the log accumulation table 792. -
FIG. 12 is a flowchart depicting a log substitution process (Step S3100) executed by theroot node 30 in thecomputer system 10. In the present embodiment, the log substitution process ofFIG. 12 (Step S3100) is implemented through software-controlled operation of theCPU 310 of theroot node 30. In the present embodiment, theroot node 30 initiates the log substitution process ofFIG. 12 (Step S3100) in the event that theleaf node 50 has sent the access log 592 to the root node 30 (Step S5150), - Once the log substitution process of
FIG. 12 (Step S3100) has been initiated, theroot node 30 receives the access log 592 from the leaf node 50 (Step S3110). Thereafter, by means of executing an access source substitution process (Step S3120) and a file path substitution process (Step S3130), theroot node 30 replaces the information relating to the local name space contained in the access log 592 sent by theleaf node 50, with information relating to the global name space. In the access source substitution process (Step S3120), the localaccess source information 5925 and thelocal process ID 5926 contained in the access log 592 that was received from theleaf node 50 are replaced with information on the global name space. In the file path source substitution process (Step S3130), the localaccess destination information 5921 and thelocal path information 5924 contained in the access log 592 that was received from theleaf node 50 are replaced with information on the global name space. After the access source substitution process (Step S3120) and the file path source substitution process (Step S3130), theroot node 30 transmits to thelog management unit 70 the access log in which the information relating to the local name space has been replaced (Step S3140). In the present embodiment, upon receiving the access log from theroot node 30, thelog management unit 70 stores the access log in the log accumulation table 92. -
FIG. 13 is a flowchart depicting the access source substitution process (Step S3120) executed by theroot node 30 in thecomputer system 10. Once the access source substitution process shown inFIG. 13 (Step S3120) is initiated, theroot node 30 verifies the localaccess destination information 5921 and thelocal process ID 5926 contained in the access log 592 that was received from the leaf node 50 (Step S3122). Theroot node 30 then searches the entries in the request forwarding table 394 for ones matching the information contained in the localaccess destination information 5921 and thelocal process ID 5926 that were verified in theaccess log 592, and identifies from the request forwarding table 394 the globalaccess source information 3943 and theglobal process ID 3941 associated with these entries (Step S3124). Theroot node 30 then replaces the localaccess source information 5925 contained in the access log 592 that was received from theleaf node 50, with the information contained in the globalaccess source information 3943 identified from the request forwarding table 394 (Step S3126), as well as replacing thelocal process ID 5926 contained in the access log 592 that was received from theleaf node 50 with the information contained in theglobal process ID 3941 identified from the request forwarding table 394 (Step S3128). -
FIG. 14 is a flowchart depicting the file path substitution process (Step S3130) executed by theroot node 30 in thecomputer system 10. Once the file path substitution process shown inFIG. 14 (Step S3130) is initiated, theroot node 30 verifies the localaccess destination information 5921 and thelocal path information 5924 contained in the access log 592 contained in the access log 592 that was received from the leaf node 50 (Step S3132). Theroot node 30 then searches the entries in the GNS configuration table 392 for ones matching the information contained in the localaccess destination information 5921 and thelocal path information 5924 that were verified in theaccess log 592, and identifies from the GNS configuration table 392 theGNS path information 3921 associated with the entries (Step S3134). Theroot node 30 then replaces the localaccess destination information 5921 contained in the access log 592 that was received from theleaf node 50, with information indicating the location of theroot node 30 in the global name space (Step S3136), as well as replacing thelocal path information 5924 contained in the access log 592 that was received from theleaf node 50, with the information contained in theGNS path information 3921 identified from the GNS configuration table 392 (Step S3138). -
FIG. 15 is an illustration depicting an example of anaccess log 392 that has been substituted by theroot node 30. Theaccess log 392 ofFIG. 15 is a log derived by processing of the access log 592 shown inFIG. 11 , by the access source substitution process (Step S3120) and the file path substitution process (Step S3130). Theaccess log 392 includes globalaccess destination information 7921,access time information 7922,command information 7923,GNS path information 7924, globalaccess source information 7925, aglobal process ID 7926, and resultinformation 7927. The globalaccess destination information 7921 of the access log 392 includes the information that was substituted for the localaccess destination information 5921 in the access log 592 by the file path substitution process (Step S3130). Theaccess time information 7922 of the access log 392 contains information similar to theaccess time information 5922 of theaccess log 592. Thecommand information 7923 of the access log 392 contains information similar to thecommand information 5923 of theaccess log 592. TheGNS path information 7924 of the access log 392 contains the information that was substituted for thelocal path information 5924 of the access log 592 by the file path substitution process (Step S3130). The globalaccess source information 7925 of the access log 392 contains the information that was substituted for the localaccess destination information 5925 of the access log 592 by the access destination substitution process (Step S3120). Theglobal process ID 7926 of the access log 392 contains the information that was substituted for thelocal process ID 5926 of the access log 592 by the access destination substitution process (Step S3120). Theresult information 7921 of the access log 392 contains information similar to theresult information 5927 of theaccess log 592. - A3. Effects:
- According to the
computer system 10 discussed hereinabove, since the access log 392 displayed by thelog management unit 70 is one that has been converted from local paths to global paths, the process of analyzing the access log in the global name space using global paths can be carried out easily. Moreover, since the access log 392 that has been converted from local paths to global paths has been accumulated in the log accumulation table 792 of thelog management unit 70 prior to display of the log, the speed of response to a log display request can be improved. Furthermore, since conversion of the access log from local paths to global paths is executed by theroot node 30 that manages associations between local paths to global paths, processing efficiency in thecomputer system 10 can be improved. - The computer system in Embodiment 2 is similar to the
computer system 10 of Embodiment 1, except that all access logs created by theleaf nodes 50 are transmitted directly to thelog management unit 70 without going through theroot node 30, for storage in the log accumulation table 792 of thelog management unit 70. -
FIG. 16 is a flowchart depicting a log display process (Step S7100) executed by thelog management unit 70 in Embodiment 2. In the present embodiment, the log display process ofFIG. 16 (Step S7100) is implemented through software-controlled operation of theCPU 710 of thelog management unit 70. Thelog management unit 70 initiates the log display process ofFIG. 16 (Step S7100) in the event that the administrator of thelog management unit 70 requests log display through theuser interface 736. - When the log display process of
FIG. 16 (Step S7100) is initiated, thelog management unit 70 receives the log display request from the administrator via the user interface 736 (Step S7110). Thelog management unit 70 then reads out from the log accumulation table 792 the range of access log entries specified in the log display request which it has received (Step S7120). Subsequently, in the event it is necessary to convert the information relating to the local name space included in the access log that was read from the log accumulation table 792, to information relating to the global name space (Step S7130), thelog management unit 70 will execute an access source substitution process (Step S7140) and a file path substitution process (Step S7150), then display the access log on the display via the user interface (Step S7160). If on other hand conversion of the access log is not necessary (Step S7130), thelog management unit 70 will display on the display the unmodified access log read out from the log accumulation table 792 (Step S7170). Instances in which modification of the access log is not necessary (Step S7130) could include, for example, where the access log contains no file paths (e.g. when acquiring file system attributes, or switching the file forwarding mode), or where an access log has been created for the system administrator (e.g. a wiring fault between devices, a power fault, etc.). The access source substitution process (Step S7140) and the file path substitution process (Step S7150) are similar to the access source substitution process (Step S3120) and the file path substitution process (Step S3130), except that they are executed by thelog management unit 70 instead of theroot node 30. In the present embodiment, in order to execute the source substitution process (Step S7140) and the file path substitution process (Step S7150), thelog management unit 70 collects information contained in the logs in order to create tables similar to the GNS configuration table 392 and the request forwarding table 394 managed by theroot node 30, and stores these tables in theHDD 750. -
FIG. 17 is an illustration depicting an example of anunconverted log 794 accumulated in the log accumulation table 792 of thelog management unit 70 in Embodiment 2.FIG. 18 is an illustration depicting a convertedlog 796 derived by conversion from theunconverted log 794 ofFIG. 17 , by the log display process (Step S7100). In the present embodiment, thelog management unit 70 creates a table similar to the GNS configuration table 392, from the log entry relating to the command “change_gns” shown in the first row ofFIG. 17 . In the present embodiment, thelog management unit 70 creates a table similar to the request forwarding table 394, from the log entries relating to the command “forward” shown in the second and fourth rows ofFIG. 17 . In the present embodiment, the log entries relating to the command “change_gns” and the command “forward” are handled as log entries for which path conversion is unnecessary in the log display process (Step S7100), and are displayed as-is without conversion, as shown in the converted log 976 ofFIG. 18 . - According to the computer system in Embodiment 2 discussed hereinabove, since conversion of the access log from local paths to global paths is executed in response to a log display request (Step S7100), the processing load on the computer system during execution of file access can be reduced.
- While the invention has been described hereinabove in terms of certain preferred embodiments, the invention is in no way limited to these, and may be reduced to practice in various other ways without departing from the spirit thereof.
- The access display unit may include: a post-conversion log accumulation unit for cumulating the access log converted from the local path to the global path by the access log conversion unit; and a accumulated log display unit that displays the access log accumulated in the post-conversion log accumulation unit, in response to a request for displaying the accumulated access log. According the computer system described above, an access log converted from local paths to global paths is accumulated prior to log display, whereby the speed of response to a log display request can be improved.
- The access log conversion unit may include: a pre-conversion log accumulation unit for cumulating the access log received by the access log reception unit; and a accumulated log conversion unit that converts the local path used in the access log accumulated in the pre-conversion log accumulation unit, into the global path associated, by the path configuration unit, with the local path used in the accumulated access log. According the computer system described above, conversion of the access log from local paths to global paths is executed in response to a log display request, whereby it is possible to reduce the processing load on the computer system during execution of file access.
- The computer system may further comprise a root node that is connected to the host computer system and constitutes the access path conversion unit, and the path configuration unit, the access log reception unit, and the access log conversion unit may be disposed in the root node. According the computer system described above, conversion of the access log from local paths to global paths is executed by a root node that manages the associations between local paths and global paths, whereby processing efficiency in the computer system can be improved.
- The storage system may include: a storage unit for storing the file; and a leaf node that manages file storage in the storage unit; and the leaf node may include: a log creation unit that creates the access log using a local path; and a log forwarding unit that forwards the access log created by the log creation unit to the access log reception unit. According the computer system described above, conversion of the access log from global paths to local paths can be accomplished even in a storage system composed of storage units and leaf nodes.
- The access path conversion unit may convert an access request source appended to the file access, from the host computer system to the access path conversion unit, in addition to converting the global path used in the file access into the local path; and the access log conversion unit may convert an access request source recorded in the access log from the access path conversion unit to the host computer system, in addition to converting the local path used in the access log into the global path. According the computer system described above, while processing file accesses on the storage system end using the real access requesters, it is nevertheless possible to create an access log that records the host computer system as the access requester.
- The access path conversion unit may convert an access identification code appended to the file access, from a first identification code to a second identification code, in addition to converting the global path used in the file access into the local path; and the access log conversion unit may convert an access identification code recorded in the access log from the second identification code to the first identification code, in addition to converting the local path used in the access log into the global path. According the computer system described above, while processing file accesses on the storage system end using identification codes over local paths, it is nevertheless possible to create an access log using identification codes over global paths.
- Although the invention has been described and illustrated in detail, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of limitation, the spirit and scope of the invention being limited only by the terms of the appended claims.
Claims (15)
1. A computer system comprising:
a storage system for storing data as a file;
a host computer system that performs file access to the storage system;
a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system;
an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system;
an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access;
an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and
an access log display unit that displays the access log converted from the local path into the global path by the access log conversion unit.
2. The computer system according to claim 1 ,
wherein the access display unit includes:
a post-conversion log accumulation unit for cumulating the access log converted from the local path to the global path by the access log conversion unit; and
a accumulated log display unit that displays the access log accumulated in the post-conversion log accumulation unit, in response to a request for displaying the accumulated access log.
3. The computer system according to claim 1 ,
wherein the access log conversion unit includes:
a pre-conversion log accumulation unit for cumulating the access log received by the access log reception unit; and
a accumulated log conversion unit that converts the local path used in the access log accumulated in the pre-conversion log accumulation unit, into the global path associated, by the path configuration unit, with the local path used in the accumulated access log.
4. The computer system according to claim 1 ,
the computer system further comprising a root node that is connected to the host computer system and constitutes the access path conversion unit,
wherein the path configuration unit, the access log reception unit, and the access log conversion unit are disposed in the root node.
5. The computer system according to claim 1 , wherein the storage system includes:
a storage unit for storing the file; and
a leaf node that manages file storage in the storage unit; and
wherein the leaf node includes:
a log creation unit that creates the access log using a local path; and
a log forwarding unit that forwards the access log created by the log creation unit to the access log reception unit.
6. The computer system according to claim 1 , wherein:
the access path conversion unit converts an access request source appended to the file access, from the host computer system to the access path conversion unit, in addition to converting the global path used in the file access into the local path; and
the access log conversion unit converts an access request source recorded in the access log from the access path conversion unit to the host computer system, in addition to converting the local path used in the access log into the global path.
7. The computer system according to claim 1 , wherein:
the access path conversion unit converts an access identification code appended to the file access, from a first identification code to a second identification code, in addition to converting the global path used in the file access into the local path; and
the access log conversion unit converts an access identification code recorded in the access log from the second identification code to the first identification code, in addition to converting the local path used in the access log into the global path.
8. A root node relaying file access from a host computer system to a storage system,
the root node comprising:
a path configuration unit that associates a local path with a global path, wherein the local path represents a location of the file stored in the storage system, and the global path represents a virtual location of the stored file to the host computer system;
an access path conversion unit that converts a global path used in the file access from the host computer system, into a local path associated, by the path configuration unit, with the global path used in the file access, and forwards the converted file access to the storage system;
an access log reception unit that receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access;
an access log conversion unit that converts the local path used in the access log received by the access log reception unit, into a global path associated, by the path configuration unit, with the local path used in the received access log; and
an access log display unit that displays the access log converted from the local path into the global path by the access log conversion unit.
9. The root node according to claim 8 , wherein:
the access path conversion unit converts an access request source appended to the file access, from the host computer system to the access path conversion unit, in addition to converting the global path used in the file access into the local path; and
the access log conversion unit converts an access request source recorded in the access log from the access path conversion unit to the host computer system, in addition to converting the local path used in the access log into the global path.
10. The root node according to claim 8 , wherein:
the access path conversion unit converts an access identification code appended to the file access, from a first identification code to a second identification code, in addition to converting the global path used in the file access into the local path; and
the access log conversion unit converts an access identification code recorded in the access log from the second identification code to the first identification code, in addition to converting the local path used in the access log into the global path.
11. A log management method for managing an access log representing execution of file access from a host computer system to a storage system,
the log management method comprising:
(a) storing a path configuration table for associating a local path with a global path, in a root node that relays file access from the host computer system to the storage system, wherein the local path represents a location of the file stored in the storage system, the global path represents a virtual location of the stored file to the host computer system;
(b) converting, on the root node, a global path used in the file access from the host computer system, into a local path associated, by the path configuration table, with the global path used in the file access, to forward the converted file access to the storage system;
(c) receives an access log using the local path from the storage system after the converted file access is forwarded to the storage system, wherein the access log represents execution record of the forwarded file access;
(d) converting the local path used in the received access log, into a global path associated, by the path configuration table, with the local path used in the received access log; and
(e) displaying the access log converted from the local path into the global path.
12. The log management method according to claim 11 ,
wherein the step (e) includes:
cumulating the access log converted from the local path to the global path; and
displaying the accumulated access log in response to a request for displaying the accumulated access log.
13. The log management method according to claim 11 ,
wherein the storage system includes:
a storage unit for storing the file; and
a leaf node that manages file storage in the storage unit; and
wherein log management method further comprising:
(f) creating, on the leaf node, the access log using a local path; and
(g) forwarding the created access log to the root node.
14. The log management method according to claim 11 , wherein:
the step (b) includes converting an access request source appended to the file access, from the host computer system to the root node, in addition to converting the global path used in the file access into the local path; and
the step (d) includes converting an access request source recorded in the access log from the root node to the host computer system, in addition to converting the local path used in the access log into the global path.
15. The log management method according to claim 11 , wherein:
the step (b) includes converting an access identification code appended to the file access, from a first identification code to a second identification code, in addition to converting the global path used in the file access into the local path; and
the step (d) includes converting an access identification code recorded in the access log from the second identification code to the first identification code, in addition to converting the local path used in the access log into the global path.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007111549A JP2008269300A (en) | 2007-04-20 | 2007-04-20 | Computer system, intermediate node and log management method |
JP2007-111549 | 2007-04-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080263222A1 true US20080263222A1 (en) | 2008-10-23 |
Family
ID=39873356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/968,737 Abandoned US20080263222A1 (en) | 2007-04-20 | 2008-01-03 | Computer system, root node, and log management method for access path conversion |
Country Status (2)
Country | Link |
---|---|
US (1) | US20080263222A1 (en) |
JP (1) | JP2008269300A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014026343A1 (en) * | 2012-08-16 | 2014-02-20 | 华为终端有限公司 | Terminal and file access method therefor |
US20140344284A1 (en) * | 2008-07-16 | 2014-11-20 | Cleversafe, Inc. | Command line interpreter for accessing a data object stored in a distributed storage network |
US20150067702A1 (en) * | 2013-08-27 | 2015-03-05 | International Business Machines Corporation | Selecting output destinations for kernel messages |
CN106657184A (en) * | 2015-10-30 | 2017-05-10 | 北京国双科技有限公司 | Method and device for analyzing log information |
US20230161505A1 (en) * | 2021-11-22 | 2023-05-25 | Nutanix, Inc. | System and method for shallow copy |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5586892B2 (en) * | 2009-08-06 | 2014-09-10 | 株式会社日立製作所 | Hierarchical storage system and file copy control method in hierarchical storage system |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6381615B2 (en) * | 2000-02-02 | 2002-04-30 | Hewlett-Packard Company | Method and apparatus for translating virtual path file access operations to physical file path access |
US20030033367A1 (en) * | 2001-08-01 | 2003-02-13 | International Business Machines Corporation | Session managing method, session managing system, and program |
US20030097454A1 (en) * | 2001-11-02 | 2003-05-22 | Nec Corporation | Switching method and switch device |
US6745207B2 (en) * | 2000-06-02 | 2004-06-01 | Hewlett-Packard Development Company, L.P. | System and method for managing virtual storage |
US20040205089A1 (en) * | 2002-10-23 | 2004-10-14 | Onaro | Method and system for validating logical end-to-end access paths in storage area networks |
US20040230787A1 (en) * | 1999-04-21 | 2004-11-18 | Emc Corporation | Method and apparatus for dynamically modifying a computer system configuration |
US6907419B1 (en) * | 2002-02-27 | 2005-06-14 | Storage Technology Corporation | Method, system, and product for maintaining within a virtualization system a historical performance database for physical devices |
US20050262233A1 (en) * | 2002-10-23 | 2005-11-24 | Roee Alon | Methods and systems for history analysis for access paths in networks |
US7024427B2 (en) * | 2001-12-19 | 2006-04-04 | Emc Corporation | Virtual file system |
US20060282483A1 (en) * | 2005-06-09 | 2006-12-14 | Koichi Hachio | File management system |
US7155486B2 (en) * | 2002-11-05 | 2006-12-26 | Hitachi, Ltd. | Storage management method |
US20070019561A1 (en) * | 2001-04-24 | 2007-01-25 | Peterson Diane L | Method and apparatus for monitoring and logging the operation of a distributed processing system |
US20070094466A1 (en) * | 2001-12-26 | 2007-04-26 | Cisco Technology, Inc., A Corporation Of California | Techniques for improving mirroring operations implemented in storage area networks and network based virtualization |
US20070094378A1 (en) * | 2001-10-05 | 2007-04-26 | Baldwin Duane M | Storage Area Network Methods and Apparatus with Centralized Management |
US7272606B2 (en) * | 2003-11-26 | 2007-09-18 | Veritas Operating Corporation | System and method for detecting and storing file content access information within a file system |
US20070276838A1 (en) * | 2006-05-23 | 2007-11-29 | Samy Khalil Abushanab | Distributed storage |
US20080126434A1 (en) * | 2006-08-03 | 2008-05-29 | Mustafa Uysal | Protocol virtualization for a network file system |
US7418466B1 (en) * | 2002-05-02 | 2008-08-26 | Palmsource, Inc. | Generating coherent global identifiers for efficient data identification |
US7428540B1 (en) * | 2000-03-03 | 2008-09-23 | Intel Corporation | Network storage system |
US7437375B2 (en) * | 2004-08-17 | 2008-10-14 | Symantec Operating Corporation | System and method for communicating file system events using a publish-subscribe model |
US7478116B2 (en) * | 2006-02-17 | 2009-01-13 | Microsoft Corporation | Mechanism to exchange primary data stream of a file |
US7565431B2 (en) * | 2003-11-20 | 2009-07-21 | International Business Machines Corporation | Method, system, and program for determining information on a storage system in a network |
US7653647B2 (en) * | 2003-11-26 | 2010-01-26 | Symantec Operating Corporation | System and method for determining file system data integrity |
US7653699B1 (en) * | 2003-06-12 | 2010-01-26 | Symantec Operating Corporation | System and method for partitioning a file system for enhanced availability and scalability |
-
2007
- 2007-04-20 JP JP2007111549A patent/JP2008269300A/en active Pending
-
2008
- 2008-01-03 US US11/968,737 patent/US20080263222A1/en not_active Abandoned
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230787A1 (en) * | 1999-04-21 | 2004-11-18 | Emc Corporation | Method and apparatus for dynamically modifying a computer system configuration |
US6381615B2 (en) * | 2000-02-02 | 2002-04-30 | Hewlett-Packard Company | Method and apparatus for translating virtual path file access operations to physical file path access |
US7428540B1 (en) * | 2000-03-03 | 2008-09-23 | Intel Corporation | Network storage system |
US6745207B2 (en) * | 2000-06-02 | 2004-06-01 | Hewlett-Packard Development Company, L.P. | System and method for managing virtual storage |
US20070019561A1 (en) * | 2001-04-24 | 2007-01-25 | Peterson Diane L | Method and apparatus for monitoring and logging the operation of a distributed processing system |
US20030033367A1 (en) * | 2001-08-01 | 2003-02-13 | International Business Machines Corporation | Session managing method, session managing system, and program |
US20070094378A1 (en) * | 2001-10-05 | 2007-04-26 | Baldwin Duane M | Storage Area Network Methods and Apparatus with Centralized Management |
US20030097454A1 (en) * | 2001-11-02 | 2003-05-22 | Nec Corporation | Switching method and switch device |
US7024427B2 (en) * | 2001-12-19 | 2006-04-04 | Emc Corporation | Virtual file system |
US20070094466A1 (en) * | 2001-12-26 | 2007-04-26 | Cisco Technology, Inc., A Corporation Of California | Techniques for improving mirroring operations implemented in storage area networks and network based virtualization |
US6907419B1 (en) * | 2002-02-27 | 2005-06-14 | Storage Technology Corporation | Method, system, and product for maintaining within a virtualization system a historical performance database for physical devices |
US7418466B1 (en) * | 2002-05-02 | 2008-08-26 | Palmsource, Inc. | Generating coherent global identifiers for efficient data identification |
US20050262233A1 (en) * | 2002-10-23 | 2005-11-24 | Roee Alon | Methods and systems for history analysis for access paths in networks |
US20040205089A1 (en) * | 2002-10-23 | 2004-10-14 | Onaro | Method and system for validating logical end-to-end access paths in storage area networks |
US7155486B2 (en) * | 2002-11-05 | 2006-12-26 | Hitachi, Ltd. | Storage management method |
US7653699B1 (en) * | 2003-06-12 | 2010-01-26 | Symantec Operating Corporation | System and method for partitioning a file system for enhanced availability and scalability |
US7565431B2 (en) * | 2003-11-20 | 2009-07-21 | International Business Machines Corporation | Method, system, and program for determining information on a storage system in a network |
US7272606B2 (en) * | 2003-11-26 | 2007-09-18 | Veritas Operating Corporation | System and method for detecting and storing file content access information within a file system |
US7653647B2 (en) * | 2003-11-26 | 2010-01-26 | Symantec Operating Corporation | System and method for determining file system data integrity |
US7437375B2 (en) * | 2004-08-17 | 2008-10-14 | Symantec Operating Corporation | System and method for communicating file system events using a publish-subscribe model |
US20060282483A1 (en) * | 2005-06-09 | 2006-12-14 | Koichi Hachio | File management system |
US7478116B2 (en) * | 2006-02-17 | 2009-01-13 | Microsoft Corporation | Mechanism to exchange primary data stream of a file |
US20070276838A1 (en) * | 2006-05-23 | 2007-11-29 | Samy Khalil Abushanab | Distributed storage |
US20080126434A1 (en) * | 2006-08-03 | 2008-05-29 | Mustafa Uysal | Protocol virtualization for a network file system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160342464A1 (en) * | 2008-07-16 | 2016-11-24 | International Business Machines Corporation | Command line interpreter for accessing a data object stored in a distributed storage network |
US20140344284A1 (en) * | 2008-07-16 | 2014-11-20 | Cleversafe, Inc. | Command line interpreter for accessing a data object stored in a distributed storage network |
US9858143B2 (en) * | 2008-07-16 | 2018-01-02 | International Business Machines Corporation | Command line interpreter for accessing a data object stored in a distributed storage network |
US9411818B2 (en) * | 2008-07-16 | 2016-08-09 | International Business Machines Corporation | Command line interpreter for accessing a data object stored in a distributed storage network |
CN103748565A (en) * | 2012-08-16 | 2014-04-23 | 华为终端有限公司 | Terminal and file access method therefor |
WO2014026343A1 (en) * | 2012-08-16 | 2014-02-20 | 华为终端有限公司 | Terminal and file access method therefor |
US20150067702A1 (en) * | 2013-08-27 | 2015-03-05 | International Business Machines Corporation | Selecting output destinations for kernel messages |
US9594574B2 (en) | 2013-08-27 | 2017-03-14 | International Business Machines Corporation | Selecting output destinations for kernel messages |
US9594575B2 (en) | 2013-08-27 | 2017-03-14 | International Business Machines Corporation | Selecting output destinations for kernel messages |
US9715393B2 (en) | 2013-08-27 | 2017-07-25 | International Business Machines Corporation | Selecting output destinations for kernel messages |
US9086934B2 (en) * | 2013-08-27 | 2015-07-21 | International Business Machines Corporation | Selecting output destinations for kernel messages |
CN106657184A (en) * | 2015-10-30 | 2017-05-10 | 北京国双科技有限公司 | Method and device for analyzing log information |
US20230161505A1 (en) * | 2021-11-22 | 2023-05-25 | Nutanix, Inc. | System and method for shallow copy |
Also Published As
Publication number | Publication date |
---|---|
JP2008269300A (en) | 2008-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9110909B2 (en) | File level hierarchical storage management system, method, and apparatus | |
US20190220191A1 (en) | Primary Data Storage System with Quality of Service | |
US20190278719A1 (en) | Primary Data Storage System with Data Tiering | |
US7716319B2 (en) | Computer system and method for managing log information | |
US8307170B2 (en) | Information processing method and system | |
US7945731B2 (en) | Method for reading data with storage system, data managing system for storage system and storage system | |
US20200019516A1 (en) | Primary Data Storage System with Staged Deduplication | |
JP4704161B2 (en) | How to build a file system | |
US7467241B2 (en) | Storage control method and storage control system | |
US7730071B2 (en) | Data management system and data management method | |
US20080077752A1 (en) | Storage system and audit log management method | |
US20060218369A1 (en) | Storage control method and system | |
US20080263222A1 (en) | Computer system, root node, and log management method for access path conversion | |
JP2004326162A (en) | Network system, server, data processing method, and program | |
US20090019223A1 (en) | Method and systems for providing remote strage via a removable memory device | |
CN101673283A (en) | Management terminal and computer system | |
JP4285058B2 (en) | Network management program, management computer and management method | |
JP4625675B2 (en) | Storage device resource allocation method and storage device | |
US20100235549A1 (en) | Computer and input/output control method | |
US20110282923A1 (en) | File management system, method, and recording medium of program | |
JP2007072521A (en) | Storage control system and storage controller | |
US8577934B2 (en) | System and method for a storage system response with data migration | |
JP2009193271A (en) | Storage system | |
JP5341604B2 (en) | User log collection device and user log management system | |
US20130110904A1 (en) | Method and apparatus to forward shared file stored in block storages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HITACHI, LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MATSUZAWA, KEIICHI;AKAGAWA, ETSUTARO;SONODA, KOJI;REEL/FRAME:020311/0244 Effective date: 20070611 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |